The burden isn’t on any random user/person to do this. The promise of open source is that if something gets popular enough, folks with expertise will have enough incentives to start paying attention to it.
This punts the trust to “an auditor”. For closed-source, there’s little chance (without the co-operation from the proprietor) that any other expert is able to qualify the produced reports.
Please, lets not dismiss the enormous work that goes in to securing FOSS just because xz
was compromised the way it was (presumably by a state actor). In fact, the Andres Freund, the Microsoft engineer who found the flaw, was able to narrow down the problem due to xz
’s source being readily available for inspection.
xz
is packaged by most Linux distributions: Due the virtue of it being that widely installed, it was subject to a sophisticated attack. There’s nothing inherent about closed-source software that shields it from it. As in, since we can’t look, we will never know (unless made public) if companies like Meta, Microsoft, Amazon, Google, Apple aren’t already subject to multiple espionage of multiple services by equally adept hostile actors. With FOSS, things are already public, for better and for worse.
It does, for the simple fact that emulating, simulating, reversing, modifying closed-source software is illegal. Whereas, some FOSS licenses even go to the extent of granting patent rights to all its users and forks.
That’s not a valid assumption (going out of business, that is). And of course, depends on the severity of the breach. For instance, Lenovo MiTMd TLS and … they’re still in business; though DigiNotar isn’t.